First published: Thu Aug 09 2018(Updated: )
An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 through 2.6. Under certain conditions, the integrity of EAPOL-Key messages is not checked, leading to a decryption oracle. An attacker within range of the Access Point and client can abuse the vulnerability to recover sensitive information. References: <a href="https://papers.mathyvanhoef.com/woot2018.pdf">https://papers.mathyvanhoef.com/woot2018.pdf</a> <a href="https://w1.fi/security/2018-1/unauthenticated-eapol-key-decryption.txt">https://w1.fi/security/2018-1/unauthenticated-eapol-key-decryption.txt</a>
Affected Software | Affected Version | How to fix |
---|---|---|
wpa_supplicant | >=2.0<=2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1614520 is considered high due to its potential to expose sensitive information.
To mitigate REDHAT-BUG-1614520, upgrade wpa_supplicant to version 2.7 or higher where the issue is addressed.
An attacker can exploit REDHAT-BUG-1614520 to recover sensitive information from EAPOL-Key messages.
All users running wpa_supplicant versions 2.0 through 2.6 are affected by REDHAT-BUG-1614520.
There is no specific workaround for REDHAT-BUG-1614520 other than upgrading to a secure version.